General
-
Target
3052-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
231211-srhbbsbgg6
-
MD5
945526cc9279e7dae8028bca5bb6baad
-
SHA1
d65a6625779a4bafeaf1ab081b08484f681db9be
-
SHA256
0c210b98bc6fbca0452a8fd440c08a7944b5669a80a6cb6d10f6246a1a93d600
-
SHA512
20c26b618bfc741c3d598c29f8d324d178f3de006f59e9dac4ffebcda1f6230b33b6085ab3b21ac39b91b5d99bd8cd867aef8666b722fb1b01f486c7a4877de0
-
SSDEEP
3072:aNP81J6tpdRtlPXzRrmWenUPdzyq8rSC5mLz5KlnS:MLtpdRtlPFmWenKFBWSp5Wn
Behavioral task
behavioral1
Sample
3052-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3052-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mercuresurabaya.com - Port:
21 - Username:
[email protected] - Password:
2ffPmXZ_5A{G
Targets
-
-
Target
3052-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
945526cc9279e7dae8028bca5bb6baad
-
SHA1
d65a6625779a4bafeaf1ab081b08484f681db9be
-
SHA256
0c210b98bc6fbca0452a8fd440c08a7944b5669a80a6cb6d10f6246a1a93d600
-
SHA512
20c26b618bfc741c3d598c29f8d324d178f3de006f59e9dac4ffebcda1f6230b33b6085ab3b21ac39b91b5d99bd8cd867aef8666b722fb1b01f486c7a4877de0
-
SSDEEP
3072:aNP81J6tpdRtlPXzRrmWenUPdzyq8rSC5mLz5KlnS:MLtpdRtlPFmWenKFBWSp5Wn
Score1/10 -